Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 14:40
Static task
static1
Behavioral task
behavioral1
Sample
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
Resource
win7-20240903-en
General
-
Target
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
-
Size
134KB
-
MD5
f4b1adc0184021c94cf8384a1d29ac30
-
SHA1
092c451b993486aff776c87a6bfaea0249c1f29f
-
SHA256
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3
-
SHA512
5dd1bd77fd58fdaf641f52d0cb9947fccf07a512870381eda0a2a9d96b5951a931ee4e81300e2e3628e24662ca55298b4d71de7f1cc5353fe8f0fd0659d5180d
-
SSDEEP
1536:8DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:iiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1264 omsecor.exe 1832 omsecor.exe 1844 omsecor.exe 2128 omsecor.exe 2000 omsecor.exe 2696 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 1264 omsecor.exe 1832 omsecor.exe 1832 omsecor.exe 2128 omsecor.exe 2128 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1320 set thread context of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1264 set thread context of 1832 1264 omsecor.exe 32 PID 1844 set thread context of 2128 1844 omsecor.exe 36 PID 2000 set thread context of 2696 2000 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 1320 wrote to memory of 2556 1320 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 30 PID 2556 wrote to memory of 1264 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 31 PID 2556 wrote to memory of 1264 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 31 PID 2556 wrote to memory of 1264 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 31 PID 2556 wrote to memory of 1264 2556 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 31 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1264 wrote to memory of 1832 1264 omsecor.exe 32 PID 1832 wrote to memory of 1844 1832 omsecor.exe 35 PID 1832 wrote to memory of 1844 1832 omsecor.exe 35 PID 1832 wrote to memory of 1844 1832 omsecor.exe 35 PID 1832 wrote to memory of 1844 1832 omsecor.exe 35 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 1844 wrote to memory of 2128 1844 omsecor.exe 36 PID 2128 wrote to memory of 2000 2128 omsecor.exe 37 PID 2128 wrote to memory of 2000 2128 omsecor.exe 37 PID 2128 wrote to memory of 2000 2128 omsecor.exe 37 PID 2128 wrote to memory of 2000 2128 omsecor.exe 37 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38 PID 2000 wrote to memory of 2696 2000 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exeC:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54d23bb21c3e235a254f682b7eec0504a
SHA1bac0be8afaa16d7c4c716310d745424e9b322aac
SHA256b30ff66298e0363b37a2f53cc0e24e7399ff62d387398cf0a703f859566f3f12
SHA512a00330dce8069c8d23813a2dade77a0cca2ca5eaf9cbfb2651708b5312f5173e275fca26cbc51db3c7fe08cf32e1063f49d2fa16e4ba811ecc4ca930e014382d
-
Filesize
134KB
MD539a588e079b61c002661544607507336
SHA11b93682e7d9bf687815d0c403b3d3b2e6c12afa5
SHA256cc4496cd6d653e0f06707ec05b283edf90fba9947ef4b931e18c7d8d9c070eeb
SHA5128e46ead7985e53fdd3f9b11c3d794f9791320731d1948e9d98669874e99282d63d82e55f028940d3bdf48ff67a251eca20278e5055ae5dc76490bf450ae7d538
-
Filesize
134KB
MD5e88e3d64a696a33e8327cab688da3ffc
SHA1777a97746750fe2227110acba3a3b4857bceabc2
SHA2566b502f5c2f8f8eee63c581876f0ff044fc18dc135d939c3755f46644b84b9e53
SHA51296699b0983ac4b60e5f279315294c2849ddc45175fce938231ceee646e820d9641434c450b375a45d6075f867fd4ffcec2bdfaa03f5f7251bad0d41f4ebc53a7